Edgar R. Weippl
Orcid: 0000-0003-0665-6126Affiliations:
- University of Vienna, Austria
- SBA Research, Austria
- Vienna University of Technology, Institute of Software Technology and Interactive Systems
According to our database1,
Edgar R. Weippl
authored at least 300 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Never Gonna Give You Up: Exploring Deprecated NULL Ciphers in Commercial VoWiFi Deployments.
CoRR, 2024
A logging maturity and decision model for the selection of intrusion detection cyber security solutions.
Comput. Secur., 2024
Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
Comput. Secur., September, 2023
QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems.
IEEE Trans. Ind. Informatics, April, 2023
Mach. Learn. Knowl. Extr., March, 2023
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research.
Proceedings of the 32nd USENIX Security Symposium, 2023
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the Machine Learning and Knowledge Extraction, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Dagstuhl Reports, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Strategic selection of data sources for cyber attack detection in enterprise networks: a survey and approach.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation.
Proceedings of the Secure IT Systems, 2022
Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators' Difficulties with TLS Configurations.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022
Zero-Rating, One Big Mess: Analyzing Differential Pricing Practices of European MNOs.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022
Opportunistic Algorithmic Double-Spending: - How I Learned to Stop Worrying and Love the Fork.
Proceedings of the Computer Security - ESORICS 2022, 2022
Twenty Years of Successful Translational Research: A Case Study of Three COMET Centers.
Proceedings of the Database and Expert Systems Applications - DEXA 2022 Workshops, 2022
SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
The Future of Information Systems in a Post-COVID World by TC8 (Information Systems).
Proceedings of the Advancing Research in Information and Communication Technology, 2021
Pervasive Mob. Comput., 2021
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Managing Industrial Control Systems Security Risks for Cyber Insurance (Dagstuhl Seminar 21451).
Dagstuhl Reports, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI.
Proceedings of the Machine Learning and Knowledge Extraction, 2021
Better Keep Cash in Your Boots - Hardware Wallets are the New Single Point of Failure.
Proceedings of the DeFi '21: Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
IACR Cryptol. ePrint Arch., 2020
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2020
Comput. Secur., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
2019
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges.
J. Internet Serv. Inf. Secur., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
ERCIM News, 2019
AutoHoney(I)IoT - Automated Device Independent Honeypot Generation of IoT and Industrial IoT Devices.
ERCIM News, 2019
ACM Comput. Surv., 2019
Comput. Secur., 2019
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019
Proceedings of the IECON 2019, 2019
Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process.
Proceedings of the IECON 2019, 2019
Proceedings of the International Conference on Software Security and Assurance, 2019
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective.
Proceedings of the International Conference on Software Security and Assurance, 2019
Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation, 2019
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins.
Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation, 2019
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019
Securing Information Against Manipulation in the Production Systems Engineering Process.
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019
Security Analysis and Improvement of Data Logistics in AutomationML-Based Engineering Networks.
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019
Conclusion and Outlook on Security and Quality of Complex Cyber-Physical Systems Engineering.
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019
Introduction to Security and Quality Improvement in Complex Cyber-Physical Systems Engineering.
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019
2018
IACR Cryptol. ePrint Arch., 2018
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques.
IACR Cryptol. ePrint Arch., 2018
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid.
Elektrotech. Informationstechnik, 2018
Dagstuhl Reports, 2018
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the Software Quality: Methods and Tools for Better Software and Systems, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2018
Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper).
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the Central European Cybersecurity Conference 2018, 2018
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI.
Proceedings of the Machine Learning and Knowledge Extraction, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02352-1, 2017
IEEE Commun. Surv. Tutorials, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks.
Proceedings of the Digital Nations - Smart Cities, Innovation, and Sustainability, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Computer Aided Systems Theory - EUROCAST 2017, 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Secur. Commun. Networks, 2016
Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners.
Int. J. Secur. Softw. Eng., 2016
EURASIP J. Inf. Secur., 2016
Digit. Investig., 2016
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016
Brain Informatics, 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the Sicherheit 2016: Sicherheit, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 2016 IFIP Networking Conference, 2016
Proceedings of the Information Systems Security and Privacy, 2016
Ethics in Security Research.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 1st International Workshop on Cyber-Physical Production Systems, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Int. J. Pervasive Comput. Commun., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing.
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Brain Informatics and Health - 8th International Conference, 2015
Proceedings of the Business Information Systems Workshops, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the Cloud Security Ecosystem, 2015
2014
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
An empirical study on the implementation and evaluation of a goal-driven software development risk management model.
Inf. Softw. Technol., 2014
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata.
Electron. Mark., 2014
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations.
Digit. Investig., 2014
Comput. Secur., 2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014
What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014
A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the Ninth International Conference on Availability, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02338-5, 2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs.
Inf. Secur. Tech. Rep., 2013
Int. J. Web Inf. Syst., 2013
Int. J. Pervasive Comput. Commun., 2013
Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing.
Proceedings of the IEEE International Conference on Systems, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
Proceedings of the Conference on Online Social Networks, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the CCSW'13, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Fake identities in social media: A case study on the sustainability of the Facebook business model.
J. Serv. Sci. Res., 2012
Comput. Secur., 2012
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure.
Comput. Secur., 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
IEEE Internet Comput., 2011
Int. J. Secur. Softw. Eng., 2011
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
Proceedings of the 20th USENIX Security Symposium, 2011
IT Governance, Risk & Compliance (GRC) Status Quo and Integration: An Explorative Industry Case Study.
Proceedings of the World Congress on Services, 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Governance, Risk & Compliance (GRC) Software - An Exploratory Study of Software Vendor and Market Research Perspectives.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Proceedings of the European Intelligence and Security Informatics Conference, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Guest Editorial Foreword to the Special Issue on Availability, Reliability, and Security.
IEEE Trans. Syst. Man Cybern. Part C, 2010
IEEE Trans. Syst. Man Cybern. Part C, 2010
Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems.
IxD&A, 2010
Int. J. Softw. Informatics, 2010
Elektrotech. Informationstechnik, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects.
Proceedings of the Knowledge Science, 2010
Use of Wiki Systems in Archaeology - Privacy, Security and Data Protection as Key Problems.
Proceedings of the ICE-B 2010 - Proceedings of the International Conference on e-Business, Athens, Greece, July 26, 2010
Implementation of Affective States and Learning Styles Tactics in Web-Based Learning Management Systems.
Proceedings of the ICALT 2010, 2010
Proceedings of the 40. Jahrestagung der Gesellschaft für Informatik, Service Science - Neue Perspektiven für die Informatik, INFORMATIK 2010, Leipzig, Germany, September 27, 2010
Proceedings of the International Symposium on Empirical Software Engineering and Measurement, 2010
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC).
Proceedings of the Communications and Multimedia Security, 2010
Proceedings of the Communications and Multimedia Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010
Proceedings of the Databases and Information Systems VI, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Governance, Risk & Compliance (GRC) Status Quo and Software Use: Results from A Survey Among Large Enterprises.
Proceedings of the Australasian Conference on Information Systems, 2010
Proceedings of the Intelligent Information and Database Systems, 2010
2009
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009
Proceedings of the Knowledge Science, 2009
An approach for identifying affective states through behavioral patterns in web-based learning management systems.
Proceedings of the iiWAS'2009, 2009
Proceedings of the iiWAS'2009, 2009
Proceedings of the Security Technology, 2009
Proceedings of the Database Technologies: Concepts, 2009
Proceedings of the Database Technologies: Concepts, 2009
Proceedings of the Semantic Web for Knowledge and Data Management, 2009
2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Architectural approach for handling semi-structured data in a user-centred working environment.
Int. J. Web Inf. Syst., 2007
Proceedings of the New Approaches for Security, 2007
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007
Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007
A Comparative Literature Review on RFID Security and Privacy.
Proceedings of the iiWAS'2007, 2007
Security aspects in Semantic Web Services Filtering.
Proceedings of the iiWAS'2007, 2007
Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the Business Information Systems, 10th International Conference, 2007
2006
Elektrotech. Informationstechnik, 2006
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006
Proceedings of the Practical Aspects of Knowledge Management, 6th International Conference, 2006
The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps.
Proceedings of the Ontologies-Based Databases and Information Systems, 2006
Do we Really Need Access Control?
Proceedings of the iiWAS'2006, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF.
Proceedings of the The First International Conference on Availability, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing.
Int. J. Data Warehous. Min., 2005
Interact. Technol. Smart Educ., 2005
Proceedings of the HYPERTEXT 2005, 2005
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005
Advances in Information Security 16, Springer, ISBN: 978-0-387-24341-2, 2005
2004
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms.
Electron. Commer. Res., 2004
SemanticLIFE Collaboration: Security Requirements and Solutions - Security Aspects of Semantic Knowledge Management.
Proceedings of the Practical Aspects of Knowledge Management, 5th International Conference, 2004
From Maintenance to Evolutionary Development of Web Applications: A Pragmatic Approach.
Proceedings of the Web Engineering - 4th International Conference, 2004
2003
Personal Trusted Devices for Web Services: Revisiting Multilevel Security.
Mob. Networks Appl., 2003
J. Database Manag., 2003
Can P2P Deliver What Web Repositories Promised: Global Sharing of E-Learning Content?
Proceedings of the iiWAS'2003, 2003
XML-Based OLAP Query Processing in a Federated Data Warehouses.
Proceedings of the ICEIS 2003, 2003
2002
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002
Proceedings of the Advanced Communications and Multimedia Security, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001
Content-based Management of Document Access Control.
Proceedings of the 14th International Conference on Applications of Prolog, 2001
A Modern Approach to Searching the World Wide Web: Ranking Pages by Inference over Content.
Proceedings of the 14th International Conference on Applications of Prolog, 2001
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001
Proceedings of the 2nd Australasian User Interface Conference (AUIC 2001), 29 January, 2001
Proceedings of the Fifth International Conference on Autonomous Agents, 2001
Proceedings of the 24th Australasian Computer Science Conference (ACSC 2001), 29 January, 2001
2000
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000
Knowledge Landscapes: A VR Interface for Web-Based Training Knowledge Bases.
Proceedings of the Information Modelling and Knowledge Bases XII: Tenth European-Japanese Conference on Information Modelling and Knowledge Bases, 2000
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000
Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000